DiscoverChaos Computer Club - 28C3: behind enemy lines (ogg)Evolving custom communication protocols (28c3)
Evolving custom communication protocols (28c3)

Evolving custom communication protocols (28c3)

Update: 2011-12-30
Share

Description

Even after years of committee review, communication protocols can certainly be hacked, sometimes highly entertainingly. What about creating a protocol the opposite way? Start with all the hacks that can be done and search for a protocol that gets around them all. Is it even possible? Part Time Scientists has used a GPU to help design our moon mission protocols and we'll show you the what and how. Danger: Real code will be shown!

about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4818.en.html
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Evolving custom communication protocols (28c3)

Evolving custom communication protocols (28c3)

Wes Faler